A vulnerability was found in PHP versions 7.3.x below 7.3.16 and 7.4.x below 7.4.34, while using mb_strtolower() function with UTF-32LE encoding, certain invalid strings could cause PHP to overwrite stack-allocated buffer. This could lead to memory corruption, crashes and potentially code execution.
Created php tracking bugs for this issue: Affects: fedora-all [bug 1820629]
-A vulnerability was found in PHP versions 7.3.x below 7.3.16 and 7.4.x below 7.4.34 +A vulnerability was found in PHP versions 7.3.x below 7.3.16 and 7.4.x below 7.4.4
It is difficult to trigger these issues in production code, and also depends on the way the PHP script is written. Therefore this issue has been downgraded to having moderate impact.
Upstream patch: http://git.php.net/?p=php-src.git;a=commit;h=69155120e68d2e614d5c300974a1a5610cfa2e8b
External References: https://www.php.net/ChangeLog-7.php#PHP_7_3 https://www.php.net/ChangeLog-7.php#PHP_7_4
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2020:3662 https://access.redhat.com/errata/RHSA-2020:3662
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2020-7065
This issue has been addressed in the following products: Red Hat Software Collections for Red Hat Enterprise Linux 7 Red Hat Software Collections for Red Hat Enterprise Linux 7.6 EUS Red Hat Software Collections for Red Hat Enterprise Linux 7.7 EUS Via RHSA-2020:5275 https://access.redhat.com/errata/RHSA-2020:5275